cyber security Crossword Puzzles
Cyber-Bullying 2019-07-11
Across
- Banning people from contacting you over the internet
- Sites used to contact people with a computer
- Hurting someone physically or emotionally
Down
- Use this to talk to or play with other people
- A service to help children that are sad
- People who you are born with or are related to
- People who you hang around with or Like
- to play with text someone you must be ______
8 Clues: A service to help children that are sad • People who you hang around with or Like • Hurting someone physically or emotionally • Sites used to contact people with a computer • to play with text someone you must be ______ • Use this to talk to or play with other people • People who you are born with or are related to • Banning people from contacting you over the internet
cyber sec 2023-11-14
Cyber Quiz 2025-08-29
Across
- attack disrupting services means
- shortcut key to insert a function in Excel
- invented automatical calculator
- creating fake profiles on social media
- name of the newly launched AI powered astrology feature by AstroSage AI
- when the number of users Sur passes the network capacity this network suffers the most
Down
- file extension for a macro enabled template
- what is the flow in software that can be exploited
8 Clues: invented automatical calculator • attack disrupting services means • creating fake profiles on social media • shortcut key to insert a function in Excel • file extension for a macro enabled template • what is the flow in software that can be exploited • name of the newly launched AI powered astrology feature by AstroSage AI • ...
Cyber Quiz 2025-08-29
Across
- attack disrupting services means
- file extension for a macro enabled template
- creating fake profiles on social media
- invented automatical calculator
- when the number of users Sur passes the network capacity this network suffers the most
- name of the newly launched AI powered astrology feature by AstroSage AI
Down
- what is the flow in software that can be exploited
- shortcut key to insert a function in Excel
8 Clues: invented automatical calculator • attack disrupting services means • creating fake profiles on social media • shortcut key to insert a function in Excel • file extension for a macro enabled template • what is the flow in software that can be exploited • name of the newly launched AI powered astrology feature by AstroSage AI • ...
Cyber mobbing 2026-03-10
Across
- Ein systematischer Ausschluss passiert oft bei Online-Spiele- ...
- Wie nennt man englisch ein gefälschtes Profil, das Falschinformationen verbreitet? ... - Profil
- Wer online eine unangenehme Anmache macht, versteckt sich oft hinter einem erfundenen Namen, einem ...
- Die Verbreitung von persönlichen Informationen und ...
Down
- Wenn man jemanden mit Nacktfotos unter Druck setzt (Sextortion), ist das eine Form der ...
- Intime Fotos werden oft aus Rache oder verletztem ... geteilt.
- Beim Identitätsdiebstahl wird im Namen des Opfers oft ein Fake- ... erstellt.
- Anonyme Anrufe finden mit verstellter ... statt.
8 Clues: Anonyme Anrufe finden mit verstellter ... statt. • Die Verbreitung von persönlichen Informationen und ... • Intime Fotos werden oft aus Rache oder verletztem ... geteilt. • Ein systematischer Ausschluss passiert oft bei Online-Spiele- ... • Beim Identitätsdiebstahl wird im Namen des Opfers oft ein Fake- ... erstellt. • ...
The Egypt Game from page 80 to 122 2024-05-03
Across
- what Marshall wanted to sacrifice as a joke
- Kmata's costume
- when the story took place
- what Ken and Toby calls April
- what April wants to sacrifice
- Ken and Toby's grade
Down
- the reason parents don't let their kids trick or treat by themselves
- Toby's costume
- who security belongs to
- Marshall's costume
- April and Melanie's costumes
11 Clues: Toby's costume • Kmata's costume • Marshall's costume • Ken and Toby's grade • who security belongs to • when the story took place • April and Melanie's costumes • what Ken and Toby calls April • what April wants to sacrifice • what Marshall wanted to sacrifice as a joke • the reason parents don't let their kids trick or treat by themselves
The Egypt Game from page 80 to 122 2024-05-03
Across
- what Marshall wanted to sacrifice as a joke
- Kmata's costume
- when the story took place
- what Ken and Toby calls April
- what April wants to sacrifice
- Ken and Toby's grade
Down
- the reason parents don't let their kids trick or treat by themselves
- Toby's costume
- who security belongs to
- Marshall's costume
- April and Melanie's costumes
11 Clues: Toby's costume • Kmata's costume • Marshall's costume • Ken and Toby's grade • who security belongs to • when the story took place • April and Melanie's costumes • what Ken and Toby calls April • what April wants to sacrifice • what Marshall wanted to sacrifice as a joke • the reason parents don't let their kids trick or treat by themselves
The Egypt Game from page 80 to 122 2024-05-03
Across
- what Marshall wanted to sacrifice as a joke
- Kmata's costume
- when the story took place
- what Ken and Toby calls April
- what April wants to sacrifice
- Ken and Toby's grade
Down
- the reason parents don't let their kids trick or treat by themselves
- Toby's costume
- who security belongs to
- Marshall's costume
- April and Melanie's costumes
11 Clues: Toby's costume • Kmata's costume • Marshall's costume • Ken and Toby's grade • who security belongs to • when the story took place • April and Melanie's costumes • what Ken and Toby calls April • what April wants to sacrifice • what Marshall wanted to sacrifice as a joke • the reason parents don't let their kids trick or treat by themselves
8.3 puzzle 2023-02-09
Across
- KMI and COMSEC ___ Security
- badging and CAC issuance ___Security
- Classified Material Control & material destruction ___Services
- Replaced markings FOUO, PII, SBU, etc.
- Manages space Facilities ___ & Budgeting
Down
- Develops scopes and cost estimates Facilities __
- Manages hazardous materials and waste ___Engineering
- Maintains the buildings Facilities ___& Maintenance
- Measures taken to deny unauthorized persons information
- personnel investigations Personnel & __ Security
- Manages mishap program
11 Clues: Manages mishap program • KMI and COMSEC ___ Security • badging and CAC issuance ___Security • Replaced markings FOUO, PII, SBU, etc. • Manages space Facilities ___ & Budgeting • Develops scopes and cost estimates Facilities __ • personnel investigations Personnel & __ Security • Maintains the buildings Facilities ___& Maintenance • ...
E-SAFETY 2019-03-04
Across
- if you don't like a post you can do this
- if you share with friends
- if you send someone something it is known as this
- you download onto your phone
- when you don like a post
- a picture you put online
Down
- when someone sends you hurtful/threatening posts
- you need to stay this online
- a secret word
- button you press when you like a post
10 Clues: a secret word • when you don like a post • a picture you put online • if you share with friends • you need to stay this online • you download onto your phone • button you press when you like a post • if you don't like a post you can do this • when someone sends you hurtful/threatening posts • if you send someone something it is known as this
OT cybersecurity 2024-07-16
Across
- A system that monitors and controls industrial processes
- An unauthorized act of bypassing security mechanisms
- A secret word or phrase used to authenticate access
- A security flaw that can be exploited
- Protection of sensitive information from unauthorized access
Down
- A unique identifier for a network device
- The practice of securing computer systems and networks
- An act of gaining unauthorized access to systems and networks
- A device used to control the flow of electricity in OT systems
- A network security system that monitors and controls incoming and outgoing network traffic
10 Clues: A security flaw that can be exploited • A unique identifier for a network device • A secret word or phrase used to authenticate access • An unauthorized act of bypassing security mechanisms • The practice of securing computer systems and networks • A system that monitors and controls industrial processes • Protection of sensitive information from unauthorized access • ...
H&S crossword 2023-04-27
18 Clues: space • source • vehicle • objects • objects • Handling • surfaces • Security • at height • and trips • equipment • substances • overturning • flying objects • plant equipment • machinery parts • powder (occ health) • or stationary object
Vocabulary - Zealandia 2026-03-13
17 Clues: spår • gräns • spåra • smitta • utbrott • intrång • flykting • säkerhet • att lösa • lystring • instabil • försening • mänskligheten • territorium/område • patogen, smittoämne • följsamhet/medgörlighet • att överlämna/ att ge upp
Cybersecurity Awareness 2024-10-25
Across
- Secure connection that hides your online activities
- Scrambling data to protect it from prying eyes
- Software that helps detect and remove malicious programs
- Malware disguised as legitimate software
- The ability to use or interact with data or systems
- Protects your network by blocking certain traffic
- A weakness in a system that can be exploited
- An extra layer of security requiring two forms of identification
- Manipulating people to gain confidential information
- A saved copy of data, used in case of data loss
- A risk from someone within the organization
- A security event that could harm a system or data
Down
- Converting scrambled data back into readable form
- Pretending to be someone else to deceive or scam
- A secret word or phrase used to access your account
- Malicious software that demands payment to release data
- Fraudulent emails trying to trick you into revealing information
- Criminal activities carried out using computers
- Username and password combination used to log in
- Software that secretly monitors your online activities
- Verifying who you are before gaining access
- When sensitive data is accessed without authorization
- Information collected and stored digitally
- A software update that fixes security vulnerabilities
- Someone who tries to gain unauthorized access to systems
- A type of malware that spreads by copying itself
- Following legal and regulatory cybersecurity standards
- Harmful software that damages or infiltrates devices
28 Clues: Malware disguised as legitimate software • Information collected and stored digitally • Verifying who you are before gaining access • A risk from someone within the organization • A weakness in a system that can be exploited • Scrambling data to protect it from prying eyes • Criminal activities carried out using computers • ...
Investing - Zoey Kleinknecht 2025-03-25
Across
- Is Crypto a high or low-risk investment?
- Currencies that are created and backed by government, but not tied to or backed by the value of any physical commodity
- CEO of Berkshire Hathaway
- Warren Buffet’s first rule is to never ___ money.
- How many days do you have to rollover your 401k funds?
- A sum of money made available for a particular purpose
- For education expenses
- A system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system.
- Nationally or Internationally recognized, Well Established & Financially Sound Company
- Market Capitalization is the total ___ of a company’s stock.
- A Lump Sum is better for ___ Risk Tolerance Investors
- Roth IRA contributions are made ___ tax.
Down
- A fund saved for unexpected expenses.
- For planned expenses like a new car or vacation
- For unexpected events, such as a tornado
- A mutual fund takes cash from ___ and invests in stocks, bonds, and other securities.
- Age to receive full social security benefits
- Traditional IRA contributions are made ___ tax.
- Make money with stocks by Buying ___ and selling ___
- Which President created Social Security?
- A Blue Chip Company is an example of a liquid or illiquid stock?
- Markets rising
- Social Security and Medicare taxes
- Markets falling
- A collection of stocks, bonds, or other assets that trades on a stock exchange
25 Clues: Markets rising • Markets falling • For education expenses • CEO of Berkshire Hathaway • Social Security and Medicare taxes • A fund saved for unexpected expenses. • Is Crypto a high or low-risk investment? • For unexpected events, such as a tornado • Which President created Social Security? • Roth IRA contributions are made ___ tax. • ...
Five Nights at Freddy's 2024-04-12
Across
- What is your name in night 5 in sisters location
- Who was phone guys killer
- Who possesses Springtrap
- How did William die?
- What was the name of the child that got stuffed in chica
- what state does the game take place
- Who was the victim of the bite of 83
- Who was the victim of the bite of 87
- Who possesses Golden Freddy
- Who is the most aggressive animatronic
Down
- Who created FNAF?
- Who protects you in Security breach
- Who tried to kill cassie
- Who got scooped at the end of sister location
- Who possesses Lefty
- What secret can be rarely seen on cameras
- who killed Elizabeth
- What is the original chica holding?
- What body part does Roxanne lose in Security breach
19 Clues: Who created FNAF? • Who possesses Lefty • How did William die? • who killed Elizabeth • Who tried to kill cassie • Who possesses Springtrap • Who was phone guys killer • Who possesses Golden Freddy • Who protects you in Security breach • what state does the game take place • What is the original chica holding? • Who was the victim of the bite of 83 • ...
Combat Support 2024-10-09
Across
- This branch conducts operations to protect the force and the nation from weapons of mass destruction and CBRN threats and hazards.
- Corps, This branch installs, operates, maintains, secures, and defends the Army’s portion of the Department of Defense Information Networks and Communication Security in support of the United States and multinational forces at all levels of command.
- Intelligence, This branch supports commanders and staffs in gaining situational understanding of threats, terrain, weather, and civil considerations.
Down
- Police, This branch supports unified land operations including offense, defense, stability and civil support operations. These missions span across the range of military operations from stable peace to major decisive action consisting of lethal or nonlethal engagement against the wide range of threats.
- This branch plans, integrates, synchronizes, and executes cyberspace and electromagnetic warfare operations.
5 Clues: This branch plans, integrates, synchronizes, and executes cyberspace and electromagnetic warfare operations. • This branch conducts operations to protect the force and the nation from weapons of mass destruction and CBRN threats and hazards. • ...
Vocabulario de travel 2013-02-07
19 Clues: Tour • Hotel • Flight • Ticket • Arrival • Customs • Airport • Security • Departure • Itenerary • To travel • Restrooms • Destination • waiting room • Baggage claim • Train station • To go on a trip • Check in counter • To go on vacation
SOCIAL IMPLICATIONS 2016-09-07
20 Clues: web • Use • Risk • Gmail • Power • Safety • Barries • Healthy • Facebook • Security • Safeguards • Connection • Connection • Protection • Online scams • Software crime • Promoting health • Criminal attacks • sharing of hardware devices • COMPUTING Saving work via internet
Are you clever? 2019-10-01
19 Clues: Idiot • Polizei • erraten • Million • Erdbeben • Sicherheit • Dinosaurier • als Nächstes • schlau, klug • insbesondere • Dose, Büchse • glücklicherweise • treten, schießen • beginnen, anfangen • schließen, zumachen • Katastrophe, Unglück • Treppe, Treppenstufen • rufen, anrufen, nennen • halten, behalten, aufbewahren
AMUN Crossword Extravagenza! 2012-12-09
Across
- 2013 USG-Rapp
- 2013 SG, again
- 2013 PGA
- Department that provides research to Representatives during conference
- 2013 USG-Security Council Procedures
- 2013 USG-R
- Department that creates realistic environment for Security Councils
Down
- Department that ensures we have resolutions and reports to debate
- The team in front of the room
- 2013 USG-A
- 2013 USG-P
11 Clues: 2013 PGA • 2013 USG-A • 2013 USG-P • 2013 USG-R • 2013 USG-Rapp • 2013 SG, again • The team in front of the room • 2013 USG-Security Council Procedures • Department that ensures we have resolutions and reports to debate • Department that creates realistic environment for Security Councils • Department that provides research to Representatives during conference
Executive Branch Departments Crossword 2020-03-27
Across
- (abbr.) keep Americans healthy
- (abbr.) administers benefit programs for veterans
- responsible for highway programs
- handles diplomatic relationships with foreign countries
- promotes national education
- work to advance the nation's energy security
- promote economic growth and security
Down
- promotes the nation's economy
- prevent terrorist attacks in the U.S.
- helps workers get fair wages and working conditions
- oversees farming and food (USDA)
- handles the conservation of our land by managing national parks, wildlife, etc.
- (abbr.) work on housing needs to help poorer families buy homes
- provides military to defend our country
- job to enforce the law and protect public safety
15 Clues: promotes national education • promotes the nation's economy • (abbr.) keep Americans healthy • oversees farming and food (USDA) • responsible for highway programs • promote economic growth and security • prevent terrorist attacks in the U.S. • provides military to defend our country • work to advance the nation's energy security • ...
history 2023-12-12
Across
- no social classes everything is equal and fair
- where all the people who lost their jobs and money went to for a home
- women who wore short dresses and did things men did
- gang leader in the 1920s that made millions by selling illegal alc
- agricultural adjustment act
- federal deposit insurance corp.
- repealed the 18th amendment
- security and extange commicion
Down
- pro native american and opposed immigrants
- president who made the New Deal Plan
- where people would go to get alc
- sold alc to speakeasies
- works progress administration
- civilan conservation act
- social security act
15 Clues: social security act • sold alc to speakeasies • civilan conservation act • agricultural adjustment act • repealed the 18th amendment • works progress administration • security and extange commicion • federal deposit insurance corp. • where people would go to get alc • president who made the New Deal Plan • pro native american and opposed immigrants • ...
UN 2025-03-29
Across
- Power to block Security Council resolutions
- Chief administrative officer of the UN
- Coordinates global economic and social work
- Responsible for maintaining global peace and security
- Missions to help countries maintain stability
- Aid provided to populations in crisis
- Document outlining fundamental human rights
Down
- Former body overseeing trust territories
- Main deliberative body of the UN
- High-level meetings of world leaders
- Specialized organizations linked to the UN
- 17 global objectives for sustainable development
- Judicial organ resolving disputes between countries
- Independent organizations partnering with the UN
- Founding treaty establishing the UN's principles
15 Clues: Main deliberative body of the UN • High-level meetings of world leaders • Aid provided to populations in crisis • Chief administrative officer of the UN • Former body overseeing trust territories • Specialized organizations linked to the UN • Power to block Security Council resolutions • Coordinates global economic and social work • ...
Disruptive Technology 2025-07-24
Across
- Protecting individual network points with continuous monitoring and response.
- Tech designed for long-term ecological balance.
- Integrated security architecture, not a single wall.
- Digital access requiring multiple verification methods
- Orchestrated use of AI and RPA for efficiency.
- Software and strategies for organizational data analysis.
- IT's self-repairing security
- Broad term for subscription-based IT offerings.
- Software that learns and solves problems
Down
- Process of identifying system weaknesses.
- Network of dispersed servers.
- Virtual shared world.
- User interaction across many devices.
- Blending real and virtual worlds, for short.
- Revolutionary tech for complex problem-solving
- Policy for online risks.
16 Clues: Virtual shared world. • Policy for online risks. • IT's self-repairing security • Network of dispersed servers. • User interaction across many devices. • Software that learns and solves problems • Process of identifying system weaknesses. • Blending real and virtual worlds, for short. • Revolutionary tech for complex problem-solving • ...
Kelas 7 Chapter VI (We love what we do) 2023-01-29
What types of Bullying 2016-02-24
6 Clues: Calling people names? • Pushing people around? • Bullying on the internet? • Making up stories of a person? • Using threats to frighten others? • Spreading a rumor about a person?
Cyber Risk Crossword Puzzle 2020-08-19
Across
- Assessment approach based on numbers.
- A plan that addresses the impact level of the availability objective.
- The first step in a process that defines the impact levels of the CIA.
- An attempted security violation.
- Weakness in an information system.
- The acronym of a framework that manages risk.
- A measurement of extent of a threat.
- Unauthorized modification.
- Any person with authorized access to a system.
Down
- Assessment approach based on non-numerical values.
- The practice of protecting HW, SW, and data.
- Unauthorized disclosure.
- Reliable and timely access to resources.
- The practice of using email or fake websites to do something malicious.
- A successful security violation.
- Technical artifacts or events that suggest an attack is imminent.
- Event with the potential to impact an organization.
- The acronym of an analysis that is a key step in planning for key mission components of an IS.
18 Clues: Unauthorized disclosure. • Unauthorized modification. • An attempted security violation. • A successful security violation. • Weakness in an information system. • A measurement of extent of a threat. • Assessment approach based on numbers. • Reliable and timely access to resources. • The practice of protecting HW, SW, and data. • The acronym of a framework that manages risk. • ...
FNAF crossword 2024-04-05
Across
- Animatronics from the second game
- Animatronics from sister location
- Who gets a stage of their own
- Who causes hallucinations saying "its me"
- Animatronics from security breach
- What suit does afton get springlocked in
- Bonnie's "replacement" in security breach and ruin
Down
- Cheapest set of animatronics in pizzeria simulator
- Everyones fav black bear
- Where is glamrock bonnie hidden in ruin
- The most disregarded FNAF game
- What role do you play as in FNAF 1-3
- Where are you in FNAF 4
- *sighs* Who always comes back
- Animatronics from the third game
15 Clues: Where are you in FNAF 4 • Everyones fav black bear • Who gets a stage of their own • *sighs* Who always comes back • The most disregarded FNAF game • Animatronics from the third game • Animatronics from the second game • Animatronics from sister location • Animatronics from security breach • What role do you play as in FNAF 1-3 • Where is glamrock bonnie hidden in ruin • ...
Centre, cure, cave 2025-04-28
Across
- hollowed out as a space
- sense of “mentally focus”
- position between extreme view
- a cosmetic treatment for feet and toenails
- is to wonder what is around you
- of moderate or intermediate political views
- is to hollow out by digging
Down
- like in a cabin in size, shape or atmosphere
- states security department or ministry
- one who is eccentric - unconventional or unusual -
- to make safe guard from danger
- spiritual guide one responsible fior the care of souls
- a concaved surface thats hollow
- the epicentre is the point on earths surface
- a cavity has the quality of being hollow
15 Clues: hollowed out as a space • sense of “mentally focus” • is to hollow out by digging • position between extreme view • to make safe guard from danger • a concaved surface thats hollow • is to wonder what is around you • states security department or ministry • a cavity has the quality of being hollow • a cosmetic treatment for feet and toenails • ...
Digital rights 2025-11-24
Across
- legal right protecting creative digital works
- ability to hide your identity online
- free availability of digital content
- method of scrambling data to keep it secure
- tricking users into giving personal information
- online harassment or abuse
Down
- principle that internet traffic should be treated equally
- extra security step requiring an additional code
- record of activities left behind online
- policies for keeping user information safe
- protection of personal data online
- security system that blocks unauthorized access
- permission required before collecting data
- harmful software designed to damage systems
- monitoring user activity across websites
15 Clues: online harassment or abuse • protection of personal data online • ability to hide your identity online • free availability of digital content • record of activities left behind online • monitoring user activity across websites • policies for keeping user information safe • permission required before collecting data • method of scrambling data to keep it secure • ...
CONVERSATIONAL SELLING SKILLS 2018-12-13
16 Clues: NO • SEE • LEAD • KING • EXPERT • ENDORSE • ABILITY • MEETING • LEAKAGE • SECURITY • MONETARY • DISCUSSION • CONVERSION • FRIENDS DO THIS • REISNURANCE COMPANY • FUEL TO THE SALES ENGINE
EXTREME SPORTS 2021-09-29
15 Clues: hope • risk • mood • high • power • motive • hormone • advance • ability • certainty • peripeteia • excitement • environment • determination • jumping out of a plane
Evolution plus 2 unit2 w46-60 2018-11-04
15 Clues: gram • cukry • dieta • głośno • porcja • białka • zdrowy • głośnik • wejście • witaminy • tłuszcze • ochroniarz • ekscytujący • olbrzymi ekran • minerały (mikroelementy)
Employment Basics - Chapter 5 Vocab Test 2020-02-11
Across
- includes sick, vacation, and holiday pay
- one time event as a % of sale
- encompasses both Social Security and Medicare tax
- government required benefit covers employees injured while working at their job
- recurring % pay for sales of books, movies, music, etc.
- an employee's withholding allowance certificate used for taxes
- the money received after all taxes and deductions are made
- a given amount of time used to calculate or determine salary and establish benefits available to you by the government, examples Worker's compensation, Medicare, and Social security
- used to show potential employers educational and experience background
Down
- used as incentives by employers to enhance employment
- pay for hours over 40 usually 1.5 or 2 regular rate
- artisans method of payment
- a type of temporary insurance sponsored by the government to help employees out of work by no fault of their own
- typically offered to full time employees - health, life & disability
- a 9 digit number issued at birth used to track amount paid to government for FICA taxes
- federal and state laws that mandate the lowest compensation for work
- Navy, Marine, Army, Coast Guard, and Airforce have these
- a record given to you by employer for your records to check for accuracy and track earnings
- compensation received from employer after retirement
- type of pay before any deductions
20 Clues: artisans method of payment • one time event as a % of sale • type of pay before any deductions • includes sick, vacation, and holiday pay • encompasses both Social Security and Medicare tax • pay for hours over 40 usually 1.5 or 2 regular rate • compensation received from employer after retirement • used as incentives by employers to enhance employment • ...
Cashless society 2024-09-04
Across
- A program that offers discounts or cashback when transacting with cashless methods.
- Payment through wearable devices such as smartwatches.
- A secret code used for digital transaction security
- A type of card used for cashless transactions.
- Use of a mobile app to manage and pay routine bills such as electricity and water.
- A payment method where the bill is taken directly from the bank balance without using a card.
- A digital currency that uses blockchain technology
- User identification based on fingerprints or facial recognition for transaction security.
- A place where one can pay for products or services without using physical money
Down
- A platform that provides online payment and money transfer services.
- number used for e-wallet transactions.
- Banks that provide digital account services without a physical passbook
- Transactions made by scanning a QR code
- A unique token or code is generated for each digital transaction as a security measure.
- Technology that enables payment by simply attaching a card or device to a payment machine.
- popular digital payment tool on smartphones
- A payment system that allows users to send money to friends quickly via mobile phone
- An institution that oversees and regulates cashless transactions in a country.
- Banks that operate online without physical offices.
- A platform that allows money transfer between countries without high fees
20 Clues: number used for e-wallet transactions. • Transactions made by scanning a QR code • popular digital payment tool on smartphones • A type of card used for cashless transactions. • A digital currency that uses blockchain technology • A secret code used for digital transaction security • Banks that operate online without physical offices. • ...
INVESTING Patrick McVeigh 2025-03-25
Across
- personal pre tax max contribution is 7000
- traditional IRA contributes are made
- THREE maximum age to start IRA
- a item of value held up by belief with no physical commodity
- at what age can you invest in crypto
- currency backed by the government but not tied to physical commodity.
- a tax you pay towards the government thats used for retirement.
- what category does crypto fall under
- before investing in crypto only invest what your willing to… employer manages pensions
- measures the price performance of a basket of securities
- a digital ledger of transactions that duplicates and distrbutes across a network.
- the availability of cash or the ease in which a asset can convert to cash
Down
- the total value of a companies stock
- you can collect full benefits for social security
- what president created social security
- warren buffets first rule
- a total amount set aside and dedicated for a specific purpose.
- is when equal portions are invested at a market in intervals
- Roth IRA contributed are made
- if you leave your company you can
- what percentage of 18-29 invest in crypto
- The biggest fraud in U.S history was ..scandal
- Managed by employer contributions are made by you and the state.
- crypto is a risk investment
- social security and medicare together is called
- investing all you have into the market at once
26 Clues: warren buffets first rule • crypto is a risk investment • Roth IRA contributed are made • THREE maximum age to start IRA • if you leave your company you can • the total value of a companies stock • traditional IRA contributes are made • at what age can you invest in crypto • what category does crypto fall under • what president created social security • ...
Spy Words Crossword 2025-05-20
Across
- Place where money gets wasted.
- A loyal employee who is willing to engage in crime or violence as minion for their leader.
- A dramatic and exciting event, leaving the audience in suspense.
- Spying or using spies is called…
- Covert military or political operations that may employ measures not generally authorized.
- Activities designed to prevent or thwart spying by an enemy.
- 3 dimensional image formed by the interference of light beams
- A small bomb thrown by hand or launched mechanically.
- A combination of a miniature radio transmitter with a microphone.
- A part of the body that is also referred to as a weapon.
- Fancy clothing that every male spy wears.
Down
- Automated recognition of individuals using unique physical characteristics, typically for the purposes of security.
- Something designated as officially secret and accessible only to authorized people.
- A person seized or held as security for the fulfilment of a condition.
- A mode of transport including lift and propulsion.
- Cloth which acts as a brake.
- Someone who has evil actions and intentions.
- Important information.
- To ask someone a lot of questions.
- Someone who uses computers to gain unauthorized access to data.
- Device used to reduce the sound of a gun.
- A spy who gradually achieves an important position within the security defences of a country.
22 Clues: Important information. • Cloth which acts as a brake. • Place where money gets wasted. • Spying or using spies is called… • To ask someone a lot of questions. • Device used to reduce the sound of a gun. • Fancy clothing that every male spy wears. • Someone who has evil actions and intentions. • A mode of transport including lift and propulsion. • ...
ITSCM 280 Schramm 2022-10-05
Across
- Cloud where apps and data are business critical
- A disadvantage of big data is high ___ rate
- Fastest growing cloud service
- One disadvantage of cloud computing is loss of __
- Cable with inner conductor wire and insulation
- Increased __ is a disadvantage of big data
- MAC address stands for Media Access ___
- Different kinds of data being generated
- Abbreviation for Distributed Denial of Service
Down
- A security breach activity using email
- Emotion security breaches pray on
- OSI layer where IP address is used
- The ___ layer is the top layer of OSI
- The ___ layer is the bottom layer of TCP/IP
- network topology with common backbone
- Mechanism to bring the meaning out of data
- Redundant Array of Independent Drives
- RAID 0 name
- A password manager tool
- Cloud computing service that provide all services
20 Clues: RAID 0 name • A password manager tool • Fastest growing cloud service • Emotion security breaches pray on • OSI layer where IP address is used • The ___ layer is the top layer of OSI • network topology with common backbone • Redundant Array of Independent Drives • A security breach activity using email • MAC address stands for Media Access ___ • ...
AT THE AIRPORT 2017-11-08
18 Clues: PASSI • TULLI • LENTO • VAPAA • VARATTU • PUNNITA • VIISUMI • VÄLILASKU • MÄÄRÄNPÄÄ • LASKEUTUA • MATKATAVARAT • VIIVÄSTYNTYT • KÄYTÄVÄPAIKKA • TURVATARKASTUS • SAAPUVAT LENNOT • LÄHTEVÄT LENNOT • ARVIOITU LÄHTÖAIKA • MATKATAVAROIDEN NOUTOPISTE
AT THE AIRPORT 2013-08-19
17 Clues: lot • bagaż • odlot • wieża • bramka • przylot • ochrona • paszport • odprawiać • wsiadanie • cel podróży • hala odlotów • odprawa celna • port lotniczy • wózek bagażowy • taśmociąg do bagażu • towarzystwo lotnicze
unit 2a & slang expressions 2026-03-19
19 Clues: skarb • tonąć • wybuch • wyluzuj • niszczyć • przyczyna • nadążasz? • kominiarz • załatwione • katastrofa • zniszczenie • na szczęście • serio, naprawdę • nie ma problemu • zamknąć (na klucz) • znikąd: out of ____ • przemoczony: ____ wet • ochroniarz: ____ guard • chirurg plastyczny: plastic ______
digitales Arbeiten - digitales Leben 2019-07-04
Across
- Was betreiben Geräte, sowie Softwaremodule untereinander?
- Muss bei der Umsetzung von Digitalisierung besonders berücksichtigt werden.
- Grund, aus dem sich Menschen weniger face-to-face unterhalten?
- Andres Wort für Flexibilität.
- Größte infrastrukturelle Gefahr?
- Wir bei digitalem Lernen nicht mehr benötigt.
- Was ist die größte Gefahr bei einer staatlichen App?
- Entscheidet wer Schuld an einem Unfall bei autonomen Fahren trägt.
Down
- Gerät mit den Fahrzeugreparatur dokumentiert wird.
- Folge von Konkurrenz und großen Arbeitsmarkt.
- Wirtschaftliche Notwendigkeit die Digitalisierung voranzutreiben.
- Spezielle Kommunikationsinfrastruktur für Fahrzeug-zu-Fahrzeug-Kommunikation.
- Ein Medium für digitale Kommunikation.
- In einer transparenten Gesellschaft kaum vorhanden.
- Mobiles Programm für den Nutzer.
- Wer meldet zukünftig ein Fahrzeug zur Inspektion an?
16 Clues: Andres Wort für Flexibilität. • Größte infrastrukturelle Gefahr? • Mobiles Programm für den Nutzer. • Ein Medium für digitale Kommunikation. • Folge von Konkurrenz und großen Arbeitsmarkt. • Wir bei digitalem Lernen nicht mehr benötigt. • Gerät mit den Fahrzeugreparatur dokumentiert wird. • In einer transparenten Gesellschaft kaum vorhanden. • ...
EMD Polices & Procedures 2021-02-10
Across
- These passes are issued for a maximum of 5 business days at a time
- Form used by employees to declare and drop off incoming business necessary computer storage/media at Central guard.
- Application used for alarms and event view
- This report is a firsthand account of the activities the security officer performed while on duty.
- Form generated by and issued by the Purchasing Department authorizing equipment to be removed from the site
- Temporary badges can only be issued and returned to_______
- __________ Book is used by CW-EMD security to alert security officers of individuals who previously had access to the site.
- Special arrangements have been made to allow_____________ employees to bring company provided cell phones through CW-EMD property
- Alarm that sounds like a hockey goal
- Type of inspection performed by security officers to ensure that employees are using their assigned badges
- All visitors must have a ___________ completed in order to be allowed into the facility or do work on the grounds
- Document with information that must be reported to the next officer taking over that post
- This badge has a yellow background with red lettering and the Curtiss-Wright logo
- This form is used to report a situation that requires greater detail to be investigated
- Document needed when taking company property off site
Down
- Foreign Nationals are permitted to have electronics in this area and this area only
- Post where you control and perform 100% vehicle inspections
- Badge worn by visitors who are sole United States citizens who have a business relationship that requires daily or frequent visits but not require access to classified information
- Site with no security guard service that is monitored by CW-EMD
- __________ are issued if a person’s vehicle information is not registered in the Auto Registration
- Issued to employees and long term contractors to identify a vehicle and vehicle owner should there be an issue
- __________ is to be completed every time a foreign national enters the shop for a tour
- Stickers on personal owned cell phone that have been approved by the FSO/Asst. FSO are this color
- CW-EMD cleared employee has a _______ on their badge
- Secure area located in Bldg. 3A 2nd floor
- required any time work is being done inside the building that could potentially spark a fire
- Badge color reserved specifically for Foreign Nationals
- only post that is manned from 0630-2230 Monday thru Friday.
- __________visitors wearing this badge MUST ALWAYS have an EMD escort with them
29 Clues: Alarm that sounds like a hockey goal • Secure area located in Bldg. 3A 2nd floor • Application used for alarms and event view • CW-EMD cleared employee has a _______ on their badge • Document needed when taking company property off site • Badge color reserved specifically for Foreign Nationals • Temporary badges can only be issued and returned to_______ • ...
CS 2025-02-24
Across
- The act of secretly listening to or monitoring communication between two parties, often to steal sensitive data. (13)
- A decoy system or server designed to lure cybercriminals and detect malicious activities. (7)
- A security technique that isolates applications or processes in a controlled environment to prevent them from affecting the rest of the system. (10)
- An open standard for secure, passwordless authentication which is also available for authenticating into EKAMEV from smartphones. (4)
- A hidden entry point into a system, often used by attackers. (8)
- A policy that allows employees to use personal devices (like smartphones/ laptop) for work, potentially introducing security risks. (4)
- A software update designed to fix vulnerabilities. (5)
- _____________ Detection System is employed for monitoring network traffic for security breaches. (9)
- – The I of the CIA triad of cybersecurity. (9)
- A type of social engineering attack where voice communication (usually over the phone) is used to trick individuals into revealing personal information. (7)
- A physical security measure involving a small, secure space where individuals are authenticated before entering a facility. (6)
- A zone in the network segment that acts as a buffer between an internal network and external networks, often used to host public-facing services (13)
- The ChatGPT equivalent application of the office (6)
- A testing technique used to identify vulnerabilities in software by inputting random, unexpected, or malformed data. (4)
Down
- The individual who controls and directs a botnet to perform malicious activities. (9)
- A type of phishing attack that targets high-level executives to steal sensitive information. (7)
- A wireless communication protocol often used in IoT devices that can be susceptible to security vulnerabilities. (6)
- Malware that records keystrokes on a device to steal sensitive information such as passwords.(9)
- A vulnerability that is exploited by attackers before the software developer can patch it. (4-3)
- The process of substituting sensitive data with a unique identifier or token that retains its meaning but is useless if breached. (12)
- Unauthorized use of a system's resources to mine cryptocurrency. (13)
- The certifying authority that issues digital certificates for accessing CBS in the office (5)
- Redirecting a website’s traffic to a fake version of the site to steal information. (8)
- Malicious software designed to conceal its presence on a compromised system and provide privileged access. (7)
- The process of using a magnetic field to destroy data stored on magnetic media like hard drives or tapes. (10)
25 Clues: – The I of the CIA triad of cybersecurity. (9) • The ChatGPT equivalent application of the office (6) • A software update designed to fix vulnerabilities. (5) • A hidden entry point into a system, often used by attackers. (8) • Unauthorized use of a system's resources to mine cryptocurrency. (13) • ...
Safety 2021-03-25
9 Clues: Disaster • Security alert • Hazardous spill • Allowed on campus • To report a code white • Ensures computer security • Located near the front door • Used to review safety rules annually • Sent to report equipment malfunctions
November 2024-10-18
Across
- Katy Perry's number-one hit song
- We light ..... on Guy Fawkes Night
- Black.....
- International ...... Day is Celebrated on 19th November
Down
- is an American holiday celebrated on the last Thursday of November
- ...... Monday
- The flower that reminds us of who we have lost during WW1&WW2
- How many days in November?
- The day after Halloween and also a famous Girlband in 90's
9 Clues: Black..... • ...... Monday • How many days in November? • Katy Perry's number-one hit song • We light ..... on Guy Fawkes Night • International ...... Day is Celebrated on 19th November • The day after Halloween and also a famous Girlband in 90's • The flower that reminds us of who we have lost during WW1&WW2 • ...
7th tech vocab quiz 2 2014-10-13
Across
- a place in a database record where a category of information can be entered or located
- involving questions of tight and wrong behavior, following accepted rules of behavior: morally right and good. “What is moral when using technology?”
- An item used to organize files into groups
- Using features of word processing/DTP software to format and produce documents, letters, reports, flyers, and newsletters with graphics
- a type of computer application program used for storing, organizing, and retrieving information
- (Graphics Interchange format) an efficient method for storing graphics, GIF’s take up a small amount of disk space that can be transmitted quickly:(type of file)
- The unique address name for an Internet site.
- (Hypertext Markup language)- this is the coding language used to create sites on the World Wide Web
- a device for storing information in a fixed location within your computer like a filing cabinet in your computer
Down
- to set the margins, tabs, font or line spacing in layout of a document
- Transfer Protocol) A set of rules that allows two computers to “talk to one another while transferring files from one to the other, this is the protocol used when you transfer files from one computer to another across the Internet
- to make changes to a document or presentation
- the electronic posting of mean spirited messages about a person often done anonymously
- commonly known as E-mail- System designed to send messages and attachments electronically.
- (on social media sites such as twitter) a word or phrase proceeded by a hash or pound sign (#) and used to identify messages on a specific topic
- the process of transferring software/information from the Internet to you computer
- Name System) this is a service that stores, translates, and retrieves the numerical address equivalents of familiar host names that you use everyday (such as www.4teachers.org)
- Hardware and/or software that separates a local area network (LAN) into two or more parts for security purposes
- Start up a computer from a powered-down state when the computer is not already on
19 Clues: An item used to organize files into groups • to make changes to a document or presentation • The unique address name for an Internet site. • to set the margins, tabs, font or line spacing in layout of a document • Start up a computer from a powered-down state when the computer is not already on • ...
Cyber Crossword #2 2024-03-28
Across
- Precise targets or results necessary to achieve the Goal. Describes a desired outcome to achieve in the future.
- The selection of combinations of conditions, parameters, features, and specifications of a system.
- A process intended to eliminate as many security risks as possible by implementing security controls (e.g., changing default passwords, enabling security settings, and protecting privileged accounts), patching vulnerabilities, turning off nonessential services, and removing all nonessential software programs, protocols, and utilities from the system.
- A physical USB smart card, or hard token, that may be used to log in to your desktop. YubiKeys offer better security, usability and reliability and can be used as either the primary authentication device or as a companion to a smartphone.
- A cloud based solution with Multi-Factor Authentication (MFA) and Single-Sign On capabilities that grant users access to applications, systems and servers after they have successfully presented one or more forms of verification to prove their identity.
- An intentional, deliberate act to misrepresent the truth or conceal a material fact for personal gain, or to persuade another to act upon it to his or her detriment.
Down
- A form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware. This is usually done via email.
- The verification of a user’s identity by a system.
- The measure of a system’s ability to handle varying amounts of work by adding or removing resources from the system. For example, a scalable web application is one that works well with one user or many users, and that gracefully handles peaks and dips in traffic.
- A broad reference to third-party services that are accessible via the internet. Types of cloud services can include Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS).
- The ability to automate scaling up or scaling down. Elasticity is used to meet sudden bursts in capacity while agility is used to address more predictable and even planned demand and workload requirements.
- Setting clear expectations for the conduct (behaviors and actions) of the entity being governed and directing, controlling, and strongly influencing the entity to achieve these expectations. This includes specifying a framework for decision making, with assigned decision rights and accountability, intended to consistently produce desired behaviors and actions.
12 Clues: The verification of a user’s identity by a system. • The selection of combinations of conditions, parameters, features, and specifications of a system. • Precise targets or results necessary to achieve the Goal. Describes a desired outcome to achieve in the future. • ...
Cyber sec awareness 2026-01-30
Across
- An additional step in securing your account
- Malicious software that locks your files until you pay
- An incident where data is accessed without authorization
- Secret word or phrase used to gain access
- The process of verifying who you are
Down
- Malicious software designed to harm your computer
- Fraudulent emails that try to steal your credentials
- Network security system that monitors and controls traffic
- The process of encoding data to prevent unauthorized access
- Someone who gains unauthorizsd access to systems
- Our report phishing button
- Software update to fix security vulnerabilities
12 Clues: Our report phishing button • The process of verifying who you are • Secret word or phrase used to gain access • An additional step in securing your account • Software update to fix security vulnerabilities • Someone who gains unauthorizsd access to systems • Malicious software designed to harm your computer • Fraudulent emails that try to steal your credentials • ...
crossword 2024-05-07
Across
- Digital representations of users in virtual environments.
- Unauthorized use of someone's personal information.
- European data protection regulation initials.
- Compulsive behavior often linked to substance abuse.
- Data security incident.
- Online harassment or intimidation.
- A digital realm where virtual experiences flourish.
Down
- Immersive computer-generated environment.
- Monitoring or observing closely.
- Criminal activity in the digital world.
- Measures taken to safeguard against threats.
- Symbolic song of a nation or group.
12 Clues: Data security incident. • Monitoring or observing closely. • Online harassment or intimidation. • Symbolic song of a nation or group. • Criminal activity in the digital world. • Immersive computer-generated environment. • Measures taken to safeguard against threats. • European data protection regulation initials. • Unauthorized use of someone's personal information. • ...
FIRST WEEK OF SCHOOL CROSSWORD PUZZLE (SY:22-23) 2022-08-17
Across
- Guidance Counselor, 8th Grade (Last Name)
- New Guidance Counselor ,7th Grade (Last Name)
- Guidance Counselor, 6th Grade (Last Name)
- Where Principal is located
- Glades Middle School Principal (Last Name)
- GMS New Reading Coach
- Where you go if you're not feeling well
Down
- Tallest Security Guard (Last Name)
- School Mascot
- Head of School Security (Last Name)
- Where guidance counselors are located
- School Resource Officer (Last Name)
12 Clues: School Mascot • GMS New Reading Coach • Where Principal is located • Tallest Security Guard (Last Name) • Head of School Security (Last Name) • School Resource Officer (Last Name) • Where guidance counselors are located • Where you go if you're not feeling well • Guidance Counselor, 8th Grade (Last Name) • Guidance Counselor, 6th Grade (Last Name) • ...
Economics 2023-05-03
Across
- President that signed social security into law
- situation where a good is unavailable
- Written by Adam Smith
- Financial Exchange that houses many tech stocks
- Natural resources used to make goods or services
- year social security was signed into law
- index of 30 prominent US companies
- employer retirement account
Down
- limited quantities to meet unlimited demand
- reward paid to stock holders for their investment
- Grows tax free
- 500 largest companies in the US
- effort people devote to as task for which they get paid
- year the Roth IRA was created
14 Clues: Grows tax free • Written by Adam Smith • employer retirement account • year the Roth IRA was created • 500 largest companies in the US • index of 30 prominent US companies • situation where a good is unavailable • year social security was signed into law • limited quantities to meet unlimited demand • President that signed social security into law • ...
dampak sosial informatika 2025-02-07
Across
- = perangkat lunak yang mampu untuk mendapatkan akses ke suatu sistem komputer
- = aknonim robot dan network
- = penggunaan dengan menggunakan kata sandi & biometrik
- = kata lain dari enkripsi
- mandiri = sesuatu yang dimiliki pengguna
- jari = sesuatu tentang diri pengguna
Down
- = perkakas peretasan
- = sistem operasi dikerawanan
- = otentikasi dapat diterapkan pada beberapa objektif yaitu?
- manusia = kerawanan pada keamanan teknologi
- = kata lain dari data terenkripsi
- = data kecil yang digunakan untuk menyimpan informasi aktivitas kita dalam penjelajahan situs web
- = alat keamanan yang sangat berharga untuk pengamanan data
- security = fitur windows security diantaranya
- jari (2) kode khusus = metode otentikasi multifaktor menggunakan 2 item dari kategori berbeda yaitu
15 Clues: = perkakas peretasan • = kata lain dari enkripsi • = aknonim robot dan network • = sistem operasi dikerawanan • = kata lain dari data terenkripsi • jari = sesuatu tentang diri pengguna • mandiri = sesuatu yang dimiliki pengguna • manusia = kerawanan pada keamanan teknologi • security = fitur windows security diantaranya • ...
Biomes and Food Security 2017-04-16
Across
- Cereal grains are staples as they can be stored for long periods of times without ____________________. (pg. 84)
- This biome supports only nomadic reindeer herders.
- These people rely on staple crops as they are more resilient and have a low risk of failure. (pg. 84)
- This is vital for the survival of other species on Earth. (pg. 84)
- This sustains life. (pg. 84)
- Cassava contains what poison that can kill unless cooked or grated and left in the open? (pg. 85)
- This biome contains some of the richest soils int he world. (pg. 85)
- Human eat both plant and animal products and are called... (pg. 84)
- With increasing _______________ diets become more varied. (pg. 85)
- The ___________________ of food determines the number of people that can live in a region. (pg. 84)
- Most staples are ___________ __________. (pg. 84)
- The land in this biome is only suitable for grazing as there is a restricted amount of vegetation. (pg. 85)
- Staple foods in South America. (pg. 84)
- Number of rice crops produced each year in the rich alluvial soils of South-East Asia. (pg. 84)
Down
- Name/type of food that is eaten regularly by a community or society as the main part of their diet. (pg. 84)
- This varies greatly between biomes and determines the amount of food that can be gained. (pg. 85)
- This biome has impoverished soils reliant on decaying material. (pg. 85)
- Over one billion people in developing countries depend on _____________ _______ __________ as their staple food. (pg. 84/85)
- The fertile ___________ ___________ of South-East Asia support some of the highest rural population densities. (pg. 84)
- How many people have rice, maize and wheat as their staple? (pg. 84)
- This biome has limited land use due to extreme aridity. (pg. 85)
- Staple food in Asia.(pg. 84)
- These for the basis of all food chains. (pg. 84)
- Staple foods are usually readily available of quite _____________. (pg. 84)
- Staple food in Europe. (pg. 84)
25 Clues: This sustains life. (pg. 84) • Staple food in Asia.(pg. 84) • Staple food in Europe. (pg. 84) • Staple foods in South America. (pg. 84) • These for the basis of all food chains. (pg. 84) • Most staples are ___________ __________. (pg. 84) • This biome supports only nomadic reindeer herders. • This biome has limited land use due to extreme aridity. (pg. 85) • ...
TCS Information Security Crossword 2013-01-09
Across
- is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients.
- An update to fix vulnerabilities in software
- A piece of software that is malicious or intrusive
- ________ surfing occurs when someone watches a user, trying to see what is on the user’s computer screen or typed on the keyboard in the hopes of gaining access to private information.
- Attack preventing availability of a system operation or service to an authorized user
- A _____ is a program that can sneak onto your computer often through an email attachment and then make copies of itself, quickly using up all available memory.
- A unique value that is computed and stored or transmitted together with the data, for the purpose of detecting changes in it
- Highest category of information classification in TCS
- Your ________ is like a Toothbrush use it regularly, change it often, and do not share it with anyone else.
- A ____ is a program that reproduces itself over a network and can use up your computer’s resources and possibly shut your system down.
- Attack by which users are tricked into revealing sensitive information through emails appearing from organizations
- ________ theft is the stealing of a person's financial information with the intention of committing fraud
Down
- ______ engineering is referred to as an approach to gain access to information, primarily through misrepresentation, and often relies on the trusting nature of most individuals.
- ________ Information is any information that can personally identify you, such as your name, address, phone numbers, Social Security number, bank account
- A software that detects, repairs, cleans, or removes infected files from a computer
- Act of listening to a private conversation which may reveal information which can provide access to a facility or network
- Method of scrambling data that conceals the data's original meaning to prevent it from use by unauthorized people
- A weakness that can be taken advantage of to obtain unauthorized access to an asset
- Minimum password length as per TCS security policy
- Process for secure disposal of paper based information
- Before you throw something in the _____, ask yourself if this something I would give to an unauthorized person or want to become or publicly available?
- Notification for ID deletion and Physical access revocation for attrites should be sent within ________ business day(s).
- _______ is a software program that may be installed on your computer without your consent to monitor your use, send pop-up ads, redirect your computer to certain websites, or record keystrokes, which could lead to identity theft.
23 Clues: An update to fix vulnerabilities in software • A piece of software that is malicious or intrusive • Minimum password length as per TCS security policy • Highest category of information classification in TCS • Process for secure disposal of paper based information • A software that detects, repairs, cleans, or removes infected files from a computer • ...
Security Awareness Puzzle 2015 2015-02-16
Across
- Protect your laptop, cell phone or any other mobile devices by treating it like _______.
- A __________ is often an email that gets mailed in chain letter fashion describing some devasting, highly unlikely type of virus.
- Email scam or attempt to trick you into giving your password or personal information.
- ____________ is the need to ensure that the people involved with the agency, including employees, customers, and visitors, are protected from harm.
- A __________ is hardware of software that helps keep hackers from using your computer and it watches for outside attempts to access your sysytem and blocks communition that you don't permit.
- Desk If you have any question or concerns about an email that you receive you can send it to Spam@ashevillenc.gov or contact _______ _______. (2 words)
- To ________ the amount of spam you receive, be careful who you give your email address to.
- Healthy email always includes a clear and specific ____________ line.
- Do not send __________ information over email unless it is encrypted.
- Do not leave your laptop or computer ____________.
- A secure password should contain at least one of these.
- Engineering The art of tricking or manipulating people into providing information that they normally would not provide. (2 words)
- Choose a password that is easy for you to ____________ but hard for someone to guess.
- A computer ______ can be considered as the modern counterpart of a paper document.
- The state of being free from danger or threat.
- When creating a password do not use words from your favorite sport, team, hobby, recording artist or ________.
- Your password is like a ________; use it regularly, change it often, and do not share it with anyone else.
- A software that is designed to detect and destroy computer viruses.
- Another word for understanding, knowledge and well-informed.
- Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. (2 words)
- Also known as malicious software; any program or file that is harmful to a computer user.
- Do not __________ your password or account with anyone.
- Always ___________ your computer when you leave your desk.
Down
- Never forward any _________ letter.
- __________ is a popular web search engine.
- A collection of information that is organized so that it can easily be accessed, managed, and updated.
- Use __________ passwords for the various accounts that you may have.
- Never share your _________ with another person.
- _________ is software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user.
- Passwords should be _________ every 3-4 months.
- Applied to data to protect it from unauthorized use in case of theft or loss.
- __________ stick, also known as a flash drive, is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a key chain.
- Passwords should always be at least this many characters long.
- A password is stronger by using a combination of both upper and lower case ___________.
- Before you throw something in the ________, ask yourself, "Is this something I would give to an unauthorized person or want to become publicly available?"
- Use this tool to dispose of documents that contain personal or financial information.
- ________ laws such as HIPAA are designed for the regulation of personal information about individuals which can be collected by governments and other public and private organizations.
- Do not _______ your password down or attach it to your keyword or monitor.
- To protect personal information, avoid sending it via_________.
- A __________ Assessment is the process by which risks are identified and the impact of those risks determined.
40 Clues: Never forward any _________ letter. • __________ is a popular web search engine. • The state of being free from danger or threat. • Never share your _________ with another person. • Passwords should be _________ every 3-4 months. • Do not leave your laptop or computer ____________. • A secure password should contain at least one of these. • ...
Security Analysis & Portfolio Management 2022-05-15
Across
- The ability to buy or sell an asset quickly at a known price.
- The --------------------frontier represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return.
- The ---------------------- component represents the portion of the portfolio’s actual return beyond that available to an unmanaged portfolio with identical systematic risk and is used to assess the manager’s investment prowess.
- --------------------ratio measures the average return in excess of that of a benchmark portfolio divided by the standard deviation of this excess return.
- The market ------------------is used as a benchmark to evaluate the performance of funds.
- ------------------------was one of the originators of Capital Asset Pricing model.
- The stop------------------order is a conditional market order to buy the stock if it increases to a specified price.
- ------------------------laid the foundations to the Portfolio theory.
- The ----------------------theorem suggests that investment and financing are two different decisions.
Down
- The APT differs from the CAPM because the APT recognizes multiple ---------------------risk factors.
- Performance ------------------analysis attempts to distinguish the source of the portfolio’s overall performance.
- A -------------form EMH is when prices reflect all historical information.
- ------------------of returns is the measure of the degree to which rates of return move together relative to the individual mean values over time.
- A ---------------sale is a transaction in which the seller sells overpriced stock which he/she does not own but borrows from another investor through a broker.
- The --------------market is used for lending and borrowing short-term funds.
- The --------------measure is calculated as excess returns per unit of systematic risk.
- The --------------------market line is the graphical representation of CAPM.
- -------------------measure calculates the portfolio’s average return in excess of a user-selected minimum acceptable return threshold per unit of downside risk.
- --------------------measure represents the average excess return of the portfolio above that predicted by an asset pricing model.
- The market ------------------in its’ pure form means shifting funds between a market index portfolio and safe assets such as T-bills or money market funds depending on whether the market as a whole is expected to outperform the safe asset.
20 Clues: The ability to buy or sell an asset quickly at a known price. • ------------------------laid the foundations to the Portfolio theory. • A -------------form EMH is when prices reflect all historical information. • The --------------market is used for lending and borrowing short-term funds. • ...
Security Bsides Cyprus 2019 2019-09-21
Across
- Spyware, Trojan, worm, virus
- The Ripper Cracking tool
- Famous proxy tool for web penetration testing
- decode this hex -> 7365637572697479
- 127.0.0.1 IP address
- A cat tries to catch it but you can use it with your computer
- SSH means
- which is the first layer in OSI
- init 6
- not one
- Malware that encrypts data for money
- Goddess of Cyprus,Venus...
- The M in HTML
Down
- Not bind shell
- You can use it for anonymity
- Famous packet analyzer
- control and store your repo
- Famous Linux OS for Penetration Testing
- IEE 802.11 describes which type of network?
- Mac address is a 12 byte. What type of numbers?
- Not TCP
- TCP & UDP runs in that OSI Layer
- Network authentication protocol
- Cross Site _____ Attack
- name of first virus
- Which protocol is used by ping command
- Protocol that gives access to a user on a remote system
- Swiss army knife of hacking tool/frequently used as backdoor
28 Clues: init 6 • Not TCP • not one • SSH means • The M in HTML • Not bind shell • name of first virus • 127.0.0.1 IP address • Famous packet analyzer • Cross Site _____ Attack • The Ripper Cracking tool • Goddess of Cyprus,Venus... • control and store your repo • Spyware, Trojan, worm, virus • You can use it for anonymity • Network authentication protocol • which is the first layer in OSI • ...
Chapter 3 Security Plus 2024-09-04
Across
- The process of changing plaintext into ciphertext
- The process of changing encrypted text into the original text
- hiding data within an ordinary, non-secret file
- Uptime for computers
- uses two mathematically related keys
- cryptoprocessor
- brute force collision attack that exploits the probability theory
- Three basic security protections
- to implementing an older and less secure mode “fall back”
- multiplies two large prime numbers
- also called a cipher
- two or more different messages that produce the same hash value
- The art of writing in cipher
- digital fingerprints
- protect the entire hard drive using cryptography
Down
- An electronic verification of the sender
- long-term secret key does not compromise the confidentiality of past communications
- denial of the truth or validity of something
- a strong symmetric cryptographic algorithm
- decentralized, distributed and public digital ledger
- evidence or proof of something
- The process of sending and receiving secure cryptographic keys
- A removable external cryptographic device
- data used to describe the content or structure of the actual data
- is a finite sequence of rigorous instructions
- countermeasure
- immutable ledger that facilitates the process of recording transactions
- object whose state cannot be modified after it is created
- ensure data has not been altered
- mathematical value entered into the algorithm to produce ciphertext
- A downgrade attack
31 Clues: countermeasure • cryptoprocessor • A downgrade attack • Uptime for computers • also called a cipher • digital fingerprints • The art of writing in cipher • evidence or proof of something • Three basic security protections • ensure data has not been altered • multiplies two large prime numbers • uses two mathematically related keys • An electronic verification of the sender • ...
Chapter 13 Security Plus 2024-03-28
Across
- A statistical value that is the average time until a component fails
- Combining two or more devices to appear as a single unit
- The ability to maintain its operations in the face of a disruptive event
- Gathering evidence from a device
- Storing copied data away from the production facility
- A single scheduled event for copying data
- determining whether an event is actually a security incident
- The retrieval of difficult-to-obtain data
- Using multiple different devices to host or serve an application
- The maximum length of time that an organization can tolerate between backups
- A process that identifies the business functions and quantifies the impact a loss
Down
- An incident response testing exercise that is a monthly 30-minute discussion
- A record of events that occur
- restoring IT resources following a distruptive event
- Verifying that evidence was always under strict control
- A device that maintains power to equipment in case of an interruption
- Continuously copying data
- Making servers always accessible
- The process of forecasting the need for future resources
- isolating those systems that are impacted by an incident
- Taking a “picture” of the state of the data repeatedly
- A device powered by gas to generate electricity
- temporarily switching to backup procedures after an attack
23 Clues: Continuously copying data • A record of events that occur • Making servers always accessible • Gathering evidence from a device • A single scheduled event for copying data • The retrieval of difficult-to-obtain data • A device powered by gas to generate electricity • restoring IT resources following a distruptive event • ...
Chapter 14 Security Plus 2024-03-28
Across
- A document that provides detailed mandatory steps
- The withdrawal of a permit to function not following compliance
- A list of specific actions to take for threats
- proactive human identification of a cyber invasion
- The actions to be taken when an employee leaves an enterprise
- Identifying and mitigating risks brought on by a third party
- damages that are the result of not following compliance standards
- A policy that outlines how applications should be developed
- The rapid detection and elevation of a threat incident
Down
- Subset of the board that manages governance issues
- Verification of truth or authenticity
- Generating a special document or record
- A policy that defines the actions users may perform
- Automation used for entire processes instead of for a single task
- An agency responsible for enforcing government directives
- Practices an organization has in place to assign, oversee, and report
- A penalty for not following compliance standards
- Automations that constantly watch cloud deployments
- ensuring that an organization adheres to laws and regulations
- composed of internal directors who approve strategic goals and policies
- A formal statement that outlines specific requirements
21 Clues: Verification of truth or authenticity • Generating a special document or record • A list of specific actions to take for threats • A penalty for not following compliance standards • A document that provides detailed mandatory steps • Subset of the board that manages governance issues • proactive human identification of a cyber invasion • ...
Chapter 14 Security Plus 2024-03-30
Across
- A document that provides detailed mandatory steps
- The withdrawal of a permit to function not following compliance
- A list of specific actions to take for threats
- proactive human identification of a cyber invasion
- The actions to be taken when an employee leaves an enterprise
- Identifying and mitigating risks brought on by a third party
- damages that are the result of not following compliance standards
- A policy that outlines how applications should be developed
- The rapid detection and elevation of a threat incident
Down
- Subset of the board that manages governance issues
- Verification of truth or authenticity
- Generating a special document or record
- A policy that defines the actions users may perform
- Automation used for entire processes instead of for a single task
- An agency responsible for enforcing government directives
- Practices an organization has in place to assign, oversee, and report
- A penalty for not following compliance standards
- Automations that constantly watch cloud deployments
- ensuring that an organization adheres to laws and regulations
- composed of internal directors who approve strategic goals and policies
- A formal statement that outlines specific requirements
21 Clues: Verification of truth or authenticity • Generating a special document or record • A list of specific actions to take for threats • A penalty for not following compliance standards • A document that provides detailed mandatory steps • Subset of the board that manages governance issues • proactive human identification of a cyber invasion • ...
Chapter 5 Security Plus 2024-09-14
Across
- It only goes off after certain conditions are met
- inserts statements to manipulate a database server
- An attack that copies data and then uses it
- resource that is not possible due to geography
- account that is inaccessible through a normal login attempt
- A malicious program that uses a computer network to replicate
- A cookie that is only sent to the server with an encrypted request
- takes advantage of a vulnerability to move to restricted directories
- Software installed on a device without the user requesting it
- A request that has been fabricated
- Malware disguised as something useful or legitimate
Down
- An indicator of attack in which data is no longer accessible
- store data in RAM beyond the boundaries
- threat actor gains illicit access of elevated rights or privileges
- An attack in which threat actors introduce something into RAM
- An attack in which a website accepts user input without validating it
- Closing unused ports and disabling unnecessary protocols
- move from the root directory to other restricted directories
- hides its presence on the device
- depletion of memory or processing capabilities
- Installing software security updates
- Attack that copies data and then uses it
- Secure space for running untrusted software
- Malware that replicates by infecting other files or programs
- captures and stores each keystroke that a user types on the computer’s keyboard
- monitors endpoints and immediately blocks a malicious attack
- A sign an attack is currently underway
27 Clues: hides its presence on the device • A request that has been fabricated • Installing software security updates • A sign an attack is currently underway • store data in RAM beyond the boundaries • Attack that copies data and then uses it • An attack that copies data and then uses it • Secure space for running untrusted software • ...
2nd Quarter Security training 2023-04-17
Across
- Refer media questions to the ___ or community relations director.
- The robbery packet is located on the back of the ___ ___.
- Inform members of emergency and request they ___ the building.
- ____ in a secure location if you cannot escape.
- The alternate meeting point is ___ if it is unsafe at the primary.
- Ask witnesses to fill out an ___ ___.
- A ___ ___ is located under each phone.
Down
- If safe, secure cash and ___ ___ information before evacuating.
- Use the ___ to document details of the call for bomb and kidnapping threats.
- Don't be a ___.
- Once the robber leaves ___ the doors and put up closed signs.
- During a medical emergency have someone ___ with the member while another calls 911.
- Try to ___ sights, sounds, and smells that may help identify your abductors.
- Primary meeting point is at the ___ dot.
- As a last resort ____ to save yourself.
- ___ silent alarms as soon as you feel safe to do so.
- Put up a ___ paper used to signal all clear to law enforcement.
- ____ if there is an accessible escape path.
- ___ you have been robbed.
- ___ 911 to report incident only if it is safe.
- Always take threats___.
- When you see a fire ___ the fire alarm to alert others.
- Stay ___ and alert if taken hostage.
23 Clues: Don't be a ___. • Always take threats___. • ___ you have been robbed. • Stay ___ and alert if taken hostage. • Ask witnesses to fill out an ___ ___. • A ___ ___ is located under each phone. • As a last resort ____ to save yourself. • Primary meeting point is at the ___ dot. • ____ if there is an accessible escape path. • ___ 911 to report incident only if it is safe. • ...
CIS178 Participation3-Security Crossword 2023-04-20
Across
- Deliberate theft of sensitive data
- Hacker successfully exploits network/device
- Hidden secuity bypass in code
- Waknesses in software hackers exploit
- Challenge-response test verifying humanity
- Temporary, first-party, third-party
- Capture data submitted over network
- Website names into machine addresses
- Confirming a user's identity
- Software installed without user consent
Down
- Holds files hostage for money
- Audio/video changed for credibility
- Personal devices used for work
- Malicious computers controlled remotely
- Public, private, static, dynamic
- Commonplace items connected to internet
- Shield user againse harmful spyware
- Fraudulent messages for personal gain
- Adventatious malicious code attacking vulnerabilities
- Monitors and filters network traffic
20 Clues: Confirming a user's identity • Holds files hostage for money • Hidden secuity bypass in code • Personal devices used for work • Public, private, static, dynamic • Deliberate theft of sensitive data • Audio/video changed for credibility • Shield user againse harmful spyware • Temporary, first-party, third-party • Capture data submitted over network • ...
May 2023 Security Training 2023-04-24
Across
- Security device
- One type of robbery
- File this if a customer deposits more than $10,000 in cash
- The sign you look for before entering the branch
- This must be filed by AML if a customer pays for a cashier's check with $4,000 in cash
- Two people, two sets of eyes
- Must have on your person at all times
- Number one deterrent of robberies
- We check for this on the ATM when sweeping in the mornings
Down
- Every desk and teller unit are equipped with this
- Where do you find the bomb threat checklist
- What do you call if the all clear sign is still up
- Where would you log our internal auditors when they arrive at your branch
- Name of the report that you can file if you are suspicious of customer activity
- Dual control area
- Send email with sensitive information
- One example of sensitive information
- Name the binder you take with you in case of emergency
- One way to send a silent alarm to the police
- Placed in a secure bin at the end of the day
20 Clues: Security device • Dual control area • One type of robbery • Two people, two sets of eyes • Number one deterrent of robberies • One example of sensitive information • Send email with sensitive information • Must have on your person at all times • Where do you find the bomb threat checklist • One way to send a silent alarm to the police • ...
Biomes and Food Security 2026-01-29
Across
- Short-term atmospheric conditions such as daily temperature or rainfall. Weather can affect crops temporarily, but climate determines long-term agricultural suitability
- A biome found in water environments, including freshwater (rivers, lakes, wetlands) and marine (oceans, coral reefs). Aquatic biomes are essential for food production, biodiversity and climate regulation.
- Changes made by humans to natural environments, such as clearing land, irrigating crops, altering soils or introducing new species.
- Situations where land is demanded for different purposes, such as farming, housing, industry or recreation.
- The artificial supply of water to land to support agriculture.
- A large geographic region characterised by a particular climate, vegetation, soils and animal life.
- The way people, places and environments are linked and influence one another.
- The decline in land quality caused by activities such as overgrazing, deforestation and poor farming practices.
- A relationship where different systems or regions rely on each other.
- An ecosystem that functions with minimal human interference, featuring high biodiversity and balanced nutrient and water cycles.
- An ecosystem that has been modified by humans to produce food or fibre. These systems often have lower biodiversity and require external inputs such as fertilisers, irrigation and pesticides.
- The ability to meet current needs without compromising the ability of future generations to meet their own needs.
- Plants whose genetic material has been altered to improve traits such as yield, pest resistance or drought tolerance.
- A system formed by the interaction between living organisms and their physical environment.
- The long-term average of weather conditions in a place, including temperature, rainfall and seasonal patterns. Strongly influences the type of biome that develops in an area and its potential for food production.
Down
- A measure of the amount of plant biomass produced in a biome after plants use energy for respiration.
- A situation where people lack consistent access to adequate food
- The total amount of living plant material in a given area.
- The variety of plant and animal species within an ecosystem.
- Traditional systems of food production and land management developed by Aboriginal and Torres Strait Islander Peoples.
- The spatial pattern or location of a feature across the Earth’s surface. Is influenced by latitude, altitude, distance from oceans and global circulation patterns.
- A planned action or policy designed to reduce negative impacts or improve outcomes
- The distance north or south of the Equator, measured in degrees.
- A biome found on land, such as deserts, grasslands, forests and tundra
- Long-term shifts in global or regional climate patterns, largely caused by human activities such as burning fossil fuels.
- The reduction in water quality or availability due to pollution, overuse or poor management.
- The process of growing, raising or harvesting food resources
27 Clues: The total amount of living plant material in a given area. • The variety of plant and animal species within an ecosystem. • The process of growing, raising or harvesting food resources • The artificial supply of water to land to support agriculture. • A situation where people lack consistent access to adequate food • ...
Poist 2023-10-23
test 2023-09-12
18 Clues: EHS • APIs@ • Latin@ • Black@ • Women@ • Pride@ • Native@ • Security • Open Arts • IT Support • Facilities • Disability@ • Ship Happens • Transportation • Fitness Center • Events & Amenities • SEA + BEL Site Team • AV Technical Production
POG FSP Crossword 2012-12-10
Across
- Days a DOS is valid at MARSEC III
- A breach is to elude, evade and ___ security
- A person must have ___ to enter the port
- Side by side monitoring
- Sceening percent at MARSEC III
- Minimum offcers at a gate for MARSEC II
- Screening percent at MARSEC II
Down
- Survey to determine risk, threat, vulnerability
- James Whitehead is currently the
- We are a MTSA _____ facilty
- Simplest form of security
- Days a DOS is valid at MARSEC II
- Years the FSP is valid
13 Clues: Years the FSP is valid • Side by side monitoring • Simplest form of security • We are a MTSA _____ facilty • Sceening percent at MARSEC III • Screening percent at MARSEC II • James Whitehead is currently the • Days a DOS is valid at MARSEC II • Days a DOS is valid at MARSEC III • Minimum offcers at a gate for MARSEC II • A person must have ___ to enter the port • ...
Ehre 2020-02-18
War on Terror 2022-06-03
Across
- Mayor of NYC
- Washington target
- Name given to WTC site
- Site of jet recaptured by passengers and crashed
- Site of terrorist training camps
- Collapsed first
- Designation of plane crashed in PA
- Blamed but did not have role in attacks
- Plane hit first
Down
- Last remarks of passenger who helped reclaim PA plane
- VP who spoke for administration as the President was returned to Washington
- Home to most of the hijackers
- Was reading a book to children
- Legislative response to attack allowing greater surveillance of people in US
- Departure point for two of the crashed jets
- Cancelled after second crash
- Leader of Al Quaeda
- Site of previous al Quada attack on US forces
- Security New agency responsible for coordinating surveillance and security in US
- Told President of crash
20 Clues: Mayor of NYC • Collapsed first • Plane hit first • Washington target • Leader of Al Quaeda • Name given to WTC site • Told President of crash • Cancelled after second crash • Home to most of the hijackers • Was reading a book to children • Site of terrorist training camps • Designation of plane crashed in PA • Blamed but did not have role in attacks • ...
The New Deal 2024-05-11
Across
- United States Housing Authority built public housing
- Public Works of Art Project employed artists
- Federal Emergency Relief Administration provided direct relief
- Civil Works Administration created temporary jobs
- Agricultural Adjustment Act helped farmers
- Securities and Exchange Commission regulated stock market
- National Youth Administration aided students and young people
- National Industrial Recovery Act passed
- Federal Housing Administration insured mortgages
- Federal Deposit Insurance Corporation established
Down
- Tennessee Valley Authority built dams and power plants
- Social Security Act provided retirement benefits
- Works Progress Administration created jobs
- Farm Security Administration assisted rural poor
- Rural Electrification Administration brought power to farms
- Fair Labor Standards Act set minimum wage and maximum hours
- Civilian Conservation Corps employed young men
- National Labor Relations Act protected unions
- National Recovery Administration regulated industries
- Home Owners' Loan Corporation refinanced mortgages
20 Clues: National Industrial Recovery Act passed • Works Progress Administration created jobs • Agricultural Adjustment Act helped farmers • Public Works of Art Project employed artists • National Labor Relations Act protected unions • Civilian Conservation Corps employed young men • Social Security Act provided retirement benefits • ...
Cybersecurity Awareness Month 2024-09-16
Across
- Function that converts data into a fixed size
- Measures taken to protect data
- Impersonating someone or something to deceive
- Securing data by converting it into code
- Software that records keystrokes
- Software that shows unwanted ads
- Malware that encrypts files demanding ransom
- Attack using trial and error to guess passwords)
- Investment scam involving fake accounts
- Vulnerabilities exploited before being patched
- Fraudulent attempts to steal sensitive information)
Down
- Malicious software designed to damage systems
- Hidden way of bypassing security controls
- Virtual Private Network for secure connections
- Software that collects data secretly
- Online harassment or bullying
- Multi-Factor Authentication
- Self-replicating malware that spreads across networks)
- Image, video or audio generated by AI
- A system that protects networks
- Network of compromised computers under attacker control)
- Software update to fix security vulnerabilities
22 Clues: Multi-Factor Authentication • Online harassment or bullying • Measures taken to protect data • A system that protects networks • Software that records keystrokes • Software that shows unwanted ads • Software that collects data secretly • Image, video or audio generated by AI • Investment scam involving fake accounts • Securing data by converting it into code • ...
BY THE NUMBERS 2025-07-28
Across
- Obama's number, loudly?
- Digits binding a book
- Many eggs — or guesses
- FINISH Finale worth counting down?
- Stationary number that rings back?
- SIZE Feet get numbered here
- Tiny unit making call?
- Cash count for drip?
- Proof numbers add up?
- PRICE Shocking tag figure?
- Twenty or tally?
- Numbered ticket abroad?
- Coverage with numbers attached?
- Typing speed indicator?
Down
- Count on these fingers?
- COUNT Total number of dead?
- Up to them? Stylish!
- One up? Take off!
- One card to win?
- Where country charts rise?
- Earned or rotated numbers?
- Number with moves?
- Sixteen-point code format?
- Numbered right to operate?
- SECURITY Public safety number?
- Numbered top or state?
- PIECE Matched pair worn out?
- Number to follow up?
- Four-digit security key
- 2025, in Rome’s eyes?
30 Clues: One card to win? • Twenty or tally? • One up? Take off! • Number with moves? • Up to them? Stylish! • Cash count for drip? • Number to follow up? • Digits binding a book • Proof numbers add up? • 2025, in Rome’s eyes? • Many eggs — or guesses • Tiny unit making call? • Numbered top or state? • Count on these fingers? • Obama's number, loudly? • Numbered ticket abroad? • Four-digit security key • ...
IT 2025-09-11
Across
- a type of virus
- storage on the internet you can accsess from everywhere
- a security barrier that save your PC
- a type of storage in your PC
- a small computer in your pocket
- a error in a software
- a faster storage in the computer
- a software update that fixes bugs
- calculate almost everything in the computer
- you see on it what you doing on your computer
- give electiricy for the computer
Down
- a temporary astorage for faster data access
- a robot that act like humans
- you get WiFi from it
- you can write on your comuter with it
- the delay of data transfer
- a protocol for secure remote access
- a sercet word or a code for security
- a copy of a data for safety
- the short version of the graphics card
20 Clues: a type of virus • you get WiFi from it • a error in a software • the delay of data transfer • a copy of a data for safety • a robot that act like humans • a type of storage in your PC • a small computer in your pocket • a faster storage in the computer • give electiricy for the computer • a software update that fixes bugs • a protocol for secure remote access • ...
IT Terminology 2026-02-05
Across
- System used to create new content (abbr.)
- A space with nothing in it
- Person's development in a story
- Getting rid of fossil fuel emissions
- "By registering, I agree to the _"
- The curved path of an object around a planet
- A hole in security
- Someone who partakes in a project
- Entries sent in for review or approval
- Used to connect your phone to the electricity socket
- People who bring new things into existence
Down
- Process of confirming accuracy or truth
- A group of satellites working together
- Digital security
- Extremely joyful or triumphant
- Solving a problem
- Switching from a diesel car to an electric car
- A computer system used to store data
- A object orbiting a celestial body
- To go from 0 to 100
- Giving a false impression
21 Clues: Digital security • Solving a problem • A hole in security • To go from 0 to 100 • Giving a false impression • A space with nothing in it • Extremely joyful or triumphant • Person's development in a story • Someone who partakes in a project • "By registering, I agree to the _" • A object orbiting a celestial body • Getting rid of fossil fuel emissions • ...
SCWK 202 Crossword 2021-10-07
Across
- One of the two social movements. Includes the Social Security Act, Unemployment Insurance, etc.
- The use of one benefit automatically entitles you to another.
- Hint: (_ITC) -- Offers a tax refund to supplement the wages of low-income workers.
- _ _ _ _ _ _ _ _ _ disentitlements prevents duplication of services.
- Formally Aid to Families with Dependent Children (AFDC)
- Individual Development Accounts hinges on this form of philosophy
- One of the three viewpoints which discuss "worthy" and "unworthy" poor.
- Hint: Social _ _ _ _ _ _ -- One of the social change triggers, helped trigger the Social Security Act in 1935.
- Hint: _ _ _ _ _ _ _ _ _ _ _ _ security income --Federal means-tested income support for the aged, blind, and disabled.
Down
- Hint: Unemployment _ _ _ _ _ _ _ _ _ -- An income support program that has a hybrid structure, which includes state and federal financing.
- Hint: Worker’s _ _ _ _ _ _ _ _ _ _ _ _ -- Provides cash and medical benefits to injured workers on jobs.
- Topic of study for class the last three weeks.
- Hint: Basic Income _ _ _ _ _ -- Idea that guarantees a universal income.
- One of the three viewpoints that discusses the "soundness" of political US institutions.
- Hint: 1601 _ _ _ _ _ _ _ _ _ _ _ Poor Laws -- Origins of general assistance.
- Largest retirement program, includes old-age pension and disability insurance.
- _ _ _ _ _ _ _ _ _ _ entitlement authorizes people to get money from various different sources.
17 Clues: Topic of study for class the last three weeks. • Formally Aid to Families with Dependent Children (AFDC) • The use of one benefit automatically entitles you to another. • Individual Development Accounts hinges on this form of philosophy • _ _ _ _ _ _ _ _ _ disentitlements prevents duplication of services. • ...
donnabarata@gmail.com 2024-03-20
Across
- _______ act strengthens HIPAA by having more rules and stricter penalties in privacy and security laws to assure compliance in keeping client's PHI safe and secure.
- ePrescribing helps pharmacy staff spend ________ time confirming new prescriptions and refill requests.
- ePriscribing helps pharmacy staff alert physicians about possible ________ drug reactions.
- technical safeguards of HIPAA's _________ Rule are technology, policies and procedures that protect & control access to ePHI.
- _____________ facility group provides care such as emergency care, outpatient surgery and hospital stays.
- PHI is any health information regarding treatment which contains information that can reasonably __________ the client.
- De-identification of medical records is the __________ of all identifying information.
- Is a client's height considered PHI?
- a client's _________ is considered PHI.
Down
- The HITECH Act outlines the development and _______________ of Electronic Health Records in the healthcare field.
- One way HIT affects healthcare providers is by allowing them better ________ over who has access to client information.
- stands for Health Insurance Portability and Accountability Act.
- HIPAA's Security Rule applies specifically to __________.
- ______stands for Electronic Health Record
- PHR is health and medical information maintained by the ________.
- An EHR system is used to create a ________ digital health record for each client.
- There are ____ levels of fault for a HIPAA violation.
17 Clues: Is a client's height considered PHI? • a client's _________ is considered PHI. • ______stands for Electronic Health Record • There are ____ levels of fault for a HIPAA violation. • HIPAA's Security Rule applies specifically to __________. • stands for Health Insurance Portability and Accountability Act. • ...
Ben's Crossword puzzle for Bullying 2014-06-18
Across
- A type of bulling that Is said
- Someone you can tell
- You can do this to a bully online
- A website bulling can happen on
- Something you can get when you are being bullied
- Another Word for Rude
- The Person that watches the bulling happen
- The person being bullied
- someone else you can tell
Down
- You can do this to stop it from happening
- these people can stand up for you
- The person doing the bullying
- A word for over and over again
- Another thing you can do to stop it from happening
- A type of bulling over the internet
- A type of bulling that can involve kicking and punching
16 Clues: Someone you can tell • Another Word for Rude • The person being bullied • someone else you can tell • The person doing the bullying • A type of bulling that Is said • A word for over and over again • A website bulling can happen on • these people can stand up for you • You can do this to a bully online • A type of bulling over the internet • ...
Computer vocabulary and jargon 2024-01-10
Across
- special words by people who do the same kind of work
- a program that destroys your data
- the imaginary place where emails exist
- related to Internet
- the name you use to operate computer system
- a connection between one file or documents
- software designed to perform a specific task, such as word processing or web browsing
Down
- software used to access and view websites
- the secret numbers or letters
- perform the actions that let you start to use a computer
- software that detects and removes viruses and other malware
- break someone's computer
- move the text on a screen up
- software that protects a computer from unauthorized access
- unwanted email advertisements
- do a search
16 Clues: do a search • related to Internet • break someone's computer • move the text on a screen up • the secret numbers or letters • unwanted email advertisements • a program that destroys your data • the imaginary place where emails exist • software used to access and view websites • a connection between one file or documents • the name you use to operate computer system • ...
German Crossword 2020-11-09
20 Clues: home • role • bond • woman • source • security • ownership • love match • confidence • traditional • to belong to • illegitamate • single parent • foster family • living together • adoptive family • patchwork family • surrogate family • to be descended from • between generation family
German Crossword 2020-11-09
20 Clues: home • role • bond • woman • source • security • ownership • love match • confidence • traditional • to belong to • illegitamate • single parent • foster family • living together • adoptive family • patchwork family • surrogate family • to be descended from • between generation family
Refugee 2022-11-11
25 Clues: RCHNU • sudoxe • sisirc • epacse • enimaf • sserts • redrob • eegufer • eeucave • yrtnuoc • retlehs • ytiruces • decalpsid • ytilitsoh • yrautcnas • noitargim • enitnarauq • seitlausac • noitatroped • noitucesrep • noitargimmi • ssensselemoh • noitairtaper • rekees-mulysa • tnemtaert-lli
Birds & bees 2024-05-20
27 Clues: Bin • Poesi • Rosor • Lilja • Skola • Humlor • Skydda • Fåglar • Normer • Krokus • Blommor • Känslor • Hygglig • Intryck • Maskros • Respekt • Beteende • Lämpligt • Solrosor • Säkerhet • Blåklocka • Samarbete • Utbildning • Emotionell • Relationer • Inställning • Värderingar
Vocabulary man 2024-02-27
25 Clues: trip • agent • pilot • scale • police • runway • flight • customs • luggage • airport • employee • co pilot • passport • security • airplane • suitcase • vacation • passenger • escalator • stewardess • destination • flight crew • immigration • economic class • overhead storage
Ενότητα: Σπίτια 2025-10-07
26 Clues: soil • stay • cost • clay • wood • area • race • build • floor • house • brick • column • ground • comfort • heating • building • material • resident • architect • apartment • endurance • earthquake • civilization • ideal, perfect • safety, security • apartment building
PEOPLE AND COMMUNITY 2025-10-31
25 Clues: тиск • щастя • страх • зрада • любов • повага • образа • довіра • комфорт • ревнощі • безпека • чесність • контроль • вірність • рівність • цькування • підтримка • заохочення • насильство • жадібність • спілкування • маніпуляція • незалежність • егоїзм (власна вигода) • відчуття справжнього себе
K4 H4 Words lesson 1+2 2026-01-23
25 Clues: gids • vorige • meteen • kennis • beleid • kenmerk • onlangs • voordeel • lanceren • onhandig • besturen • apparaat • betrekken • omheining • prestatie • toestemming • programmeur • beveiliging • elektronica • geleidelijk • (ver)storen • natuurgebied • hoofdkantoor • afnemen; dalen • meer dan genoeg
B1 U8C 2026-03-11
Across
- STRESSI TEKITAV, PINGELINE
- TÕEND, TUNNISTUS
- KOGEMUS
- KVALIFITSEERUMA
- BIOLOOG
- KIRURG
- ARENENUD, EDASIJÕUDNUD
- KURSUS
- VÄLJAÕPE, KOOLITUS
- NÕUDLIK, PINGUTUST NÕUDEV
Down
- KVALIFIKATSIOON
- TURVATÖÖTAJA
- INIMKOND, INIMLIKKUS
- ÜLES SEADMA
- ÕPPEJÕUD, LEKTOR
- TREENER
- TIHEDALT, TIHEDASTI
- HINNE
- KAADER
- TEADUSKRAAD
- SELTSIMATU, ANTISOTSIAALNE
21 Clues: HINNE • KIRURG • KAADER • KURSUS • TREENER • KOGEMUS • BIOLOOG • ÜLES SEADMA • TEADUSKRAAD • TURVATÖÖTAJA • KVALIFIKATSIOON • KVALIFITSEERUMA • ÕPPEJÕUD, LEKTOR • TÕEND, TUNNISTUS • VÄLJAÕPE, KOOLITUS • TIHEDALT, TIHEDASTI • INIMKOND, INIMLIKKUS • ARENENUD, EDASIJÕUDNUD • NÕUDLIK, PINGUTUST NÕUDEV • STRESSI TEKITAV, PINGELINE • SELTSIMATU, ANTISOTSIAALNE
Information Security Management 2024-09-03
Across
- A detailed statement of what must be done to comply with policy, sometimes viewed as the rules governing policy compliance.
- Instructions that dictate certain behavior within an organization.
- The high-level information security policy that sets the strategic direction, scope, and tone for all of an organization’s security efforts; also known as a security program policy, general security policy, IT security policy, high-level InfoSec policy, or simply an InfoSec policy.
- A term sometimes used synonymously with objectives; the desired end of a planning cycle.
- A managerial program designed to improve the security of information assets by providing targeted knowledge, skills, and guidance for an organization’s employees.
- The actions taken by management to specify the intermediate goals and objectives of the organization in order to obtain specified strategic goals, followed by estimates and schedules for the allocation of resources necessary to achieve those goals and objectives.
Down
- The set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately, and verifying that the enterprise’s resources are used responsibly.
- Examples of actions that illustrate compliance with policies.
- Organizational policies that often function as standards or procedures to be used when configuring or maintaining systems.
- Specifications of authorization that govern the rights and privileges of users to a particular information asset; includes user access lists, matrices, and capabilities tables.
10 Clues: Examples of actions that illustrate compliance with policies. • Instructions that dictate certain behavior within an organization. • A term sometimes used synonymously with objectives; the desired end of a planning cycle. • Organizational policies that often function as standards or procedures to be used when configuring or maintaining systems. • ...
Adam Group 1 25-01-24 2024-01-19
15 Clues: greifen • Botschaft • Tor, Ziel • Erneuerung • Gleichheit • Zerstörung • mitreißend • Sicherheit • Zielgruppe • Ausstellung • Entscheidung • neu aufbauen • enttäuschend • prüfen, auswerten • Zielrichtung (2 Wörter)
1st Quarter 2022 2021-12-06
Across
- , Organization Agent Xu worked for.
- , What substance is illegal under Federal Law that is legal in some states?
- , The first name of the spy for China that stole secrets from General Electric.
- , Where was Oleg's first assignment?
- , A jury convicted Robert Hoffman in 2013 and sentenced him to?
- , Under the UCMJ article 112A, marijuana along with derived products are Schedule ___ drug.
- , What are the most common security violations with IT systems referred to?
- , ICD 705 states that Personally Owned Portable Electronic Devices are _______ within SCIFs overseas.
- , The term generically used to describe the use of a covert agent to create a romantic relationship to compromise a person.
- , What is the difference between walking to the pub and walking home from the pub?
Down
- , Oleg _____ was a double agent for MI6.
- , Where was agent Xu apprehended?
- , Robert Hoffman was a 20 year veteran of?
- , Who is appointed to investigate security violations to determine the facts of the incident?
- , What does the acronym NTK stand for?
- , What location did Hoffman visit that caused concern for the FBI?
- , Robert Hoffman believed he was communicating with a Russian Spy named?
- , What was the purpose of 'Operation Pimlico'?
- , Security Violations are ______ of classified information.
- , CBD or THC can be found in dietary supplements, food, and ________.
- , In regards to drug use or derivative use not knowing is not an _____.
21 Clues: , Where was agent Xu apprehended? • , Organization Agent Xu worked for. • , Where was Oleg's first assignment? • , What does the acronym NTK stand for? • , Oleg _____ was a double agent for MI6. • , Robert Hoffman was a 20 year veteran of? • , What was the purpose of 'Operation Pimlico'? • , Security Violations are ______ of classified information. • ...
Adrian's Regulatory Agencies Crossword Puzzle 2026-03-04
Across
- Regulates guns, alcohol, explosives.
- Stops job discrimination.
- One seller controls a market.
- Air Act Law that controls air pollution.
- Audits government spending.
- Following rules.
- Insures bank deposits.
- Manages Social Security benefits.
- Reserve Controls U.S. monetary policy.
- Handles airport security.
- Stops unfair competition.
- Handles disaster response.
- Protection Protects buyers from unfair practices.
- Natural world and resources.
- Oversees farming and food programs.
- Act Law creating consumer protections.
- Oversees brokerage firms.
- Regulates futures and commodities trading.
- Regulates national banks.
- Ensures food and drug safety.
- Buying and selling goods.
- Oversees housing programs.
- Act Law regulating sales of securities.
- Helps make the federal budget.
- Managing money and loans.
- Reports illegal activity.
Down
- Regulates the stock market.
- Moving people and goods.
- Regulates electricity and gas transmission.
- Watching to ensure proper actions.
- Workforce and worker rights.
- Making sure rules are obeyed.
- Permission to operate.
- Managing money.
- Financial assets like stocks.
- Makes workplace safety rules.
- TV, radio, and internet systems.
- Enforces federal law.
- Regulates TV, radio, and internet.
- Protects consumers from unfair business.
- Protects consumers in finance.
- Rule set by the government.
- Handles national security.
- Runs health and human services.
- Oversees transportation systems.
- Releasing important information.
- Protects the environment.
- Manages government money.
- Protects workers’ union rights.
- Enforces immigration laws.
50 Clues: Managing money. • Following rules. • Enforces federal law. • Permission to operate. • Insures bank deposits. • Moving people and goods. • Stops job discrimination. • Handles airport security. • Stops unfair competition. • Oversees brokerage firms. • Regulates national banks. • Buying and selling goods. • Protects the environment. • Manages government money. • Managing money and loans. • ...
Unite Nations 2025-04-07
Across
- The official language of the UN that is also widely spoken in Africa.
- This country is the most recent member to join the United Nations (as of 2021)
- The city where the UN headquarters are located
- The economic and social council chamber also called Ecosoc is a gift from .....
- Decisions of the General Assembly on important questions shall be made by a ........ majority of the members present and voting.
- This is the highest position in the UN.
- The country that is a permanent member of the Security Council and has veto power.
- The last territory under the Trusteeship Council before gaining independence in 1994
- the name 'United Nations' was coined by.....
- The number of non-permanent members in the UN Security Council (in letters).
- This is the principal organ responsible for the maintenance of international peace and security
Down
- UN is an ........ organization.
- the term 'United Nations' created ......... the WWII
- The UN agency focused on public health (abbreviation)
- This UN body oversees the implementation of international law and the legal work of the UN.
- The number of official languages in the United Nations (in letters)
- The UN organ where each member state has one vote
- The country that was the first to sign the UN Charter
- The UN agency that promotes education, science, and culture (abbreviation)
- How many Vice-President of GA (in letters)
20 Clues: UN is an ........ organization. • This is the highest position in the UN. • How many Vice-President of GA (in letters) • the name 'United Nations' was coined by..... • The city where the UN headquarters are located • The UN organ where each member state has one vote • the term 'United Nations' created ......... the WWII • ...
Aleksi 2024-10-16
14 Clues: Party • Tehdä • Rasismi • Äänestä • Syrjintä • Tasavalta • Eduskunta • Oikeuksia • Noudattaa • Pohjoismaa • Yksinäisyys • Sosiaaliturva • Terveydenhoito • Kansainvälinen
stay safe online 2020-05-06
6 Clues: - being bullied online • - your own information • - making sure your safe • - spending to much time online • - when someone asks for pictures • _ keeping personal information safe
Social Security Administration 2023-04-01
Across
- Who received the first SSN account?
- Who had the lowest ever SS number ever issued?
- What was the SSA formally known as? (Abbreviation)
- What demographic change rendered traditional economic security unworkable?
- What is the abbreviation for the agency?
Down
- What created the full-fledged pension system in America? (War name abbreviation)
- Who signed the Social Security Act in 1935?
- Who were the Social Security Acts supposed to benefit?
- Where are payments made?
9 Clues: Where are payments made? • Who received the first SSN account? • What is the abbreviation for the agency? • Who signed the Social Security Act in 1935? • Who had the lowest ever SS number ever issued? • What was the SSA formally known as? (Abbreviation) • Who were the Social Security Acts supposed to benefit? • ...
Are you clever? 2019-10-01
19 Clues: Idiot • erraten • Polizei • Million • Erdbeben • Sicherheit • Dinosaurier • schlau, klug • insbesondere • als Nächstes • Dose, Büchse • treten, schießen • glücklicherweise • beginnen, anfangen • schließen, zumachen • Katastrophe, Unglück • Treppe, Treppenstufen • rufen, anrufen, nennen • halten, behalten, aufbewahren
